Back to Results
First PageMeta Content
Cyberwarfare / Computer security / Cryptography / Data security / National security / Laptop theft / Plaintext / Password / Data remanence / Security / Computing / Disk encryption


Information Protection via Environmental Data Tethers Matt Beaumont-Gay Kevin Eustice
Add to Reading List

Document Date: 2008-03-19 13:30:59


Open Document

File Size: 120,96 KB

Share Result on Facebook

City

Generalized Role / /

Company

Alice / Los Alamos National Laboratory / Associated Press / Distributed Systems / Distributed Computing Systems / Cisco Systems / Washington Times / Boeing / Websense / Trusted Computing Group / Microsoft / /

Country

United States / Afghanistan / /

/

IndustryTerm

secure server / access-control systems / storage device / disk encryption systems / removable media / security systems / data protection systems / experimental operating systems / removable storage device / output devices / wireless networks / free operating systems / ad-hoc wireless networks / external server / acceptable applications / context-aware applications / data leakage prevention products / data security protection systems / security services / cryptographic file systems / commodity hardware / straightforward solution / commodity operating systems / wireless devices / peripheral device / /

OperatingSystem

UNIX / Linux / BSD / Microsoft Windows / /

Organization

National Security Agency / Federal Bureau of Investigation / United States Marine Corps / University of Delaware / Laboratory for Advanced Systems Research UCLA Computer Science ABSTRACT Faced / US military / /

Person

D. Schroeder / Matt Schnaider / K. Eustice / V / A. Hopper / V / Peter Reiher / Kevin Eustice / Matt Beaumont-Gay / /

Position

office worker / display manager / manager in order / supervisor / contractor / window manager / /

ProvinceOrState

Delaware / /

PublishedMedium

The Washington Times / /

Technology

wireless devices / peer-to-peer / UNIX / Linux / API / disk encryption / data encryption / private key / operating system / mobile device / operating systems / process control / drive encryption / IEEE 1394 / mobile devices / encryption / cryptography / public key / flow control / Windows BitLocker Drive Encryption / encryption system / http / virtual memory / Autokey protocol / Bluetooth / flash / /

URL

http /

SocialTag